Abstract: This paper addresses a current problem that occurs among Thai internet service providers with regard to bandwidth network quality management. The IPSTAR department of Telecom Organization of Thailand public company (TOT); the largest internet service provider in Thailand, is the case study to analyze the problem that exists. The Internet bandwidth network quality management (iBWQM) framework is mainly applied to the problem that has been found. Bandwidth management policy (BMP) and quality of service (QoS) are two antecedents of iBWQM. This paper investigates internet user behavior, marketing demand and network operation views in order to determine bandwidth management policy (e.g. quota management, scheduling and malicious management). The congestion of bandwidth is also analyzed to enhance quality of service (QoS). Moreover, the iBWQM framework is able to improve the quality of service and increase bandwidth utilization, minimize complaint rate concerns to slow speed, and provide network planning guidelines through Thai Internet services providers.
Abstract: This research assesses the value of the brand personality and its influence on consumer-s decision making, through relational variables, after receiving a text message ad. An empirical study, in which 380 participants have received an SMS ad, confirms that brand personality does actually influence the brand trust as well as the attachment and commitment. The levels of sensitivity and involvement have an impact on the brand personality and the related variables to it.
Abstract: This paper reports on a survey of state-of-the-art
application scenarios for smart office environments. Based on an
analysis of ongoing research activities and industry projects,
functionalities and services of future office systems are extracted. In
a second step, these results are used to identify the key characteristics
of emerging products.
Abstract: There are two major variants of the Simplex
Algorithm: the revised method and the standard, or tableau method.
Today, all serious implementations are based on the revised method
because it is more efficient for sparse linear programming problems.
Moreover, there are a number of applications that lead to dense linear
problems so our aim in this paper is to present some computational
results on parallel implementation of dense Simplex Method. Our
implementation is implemented on a SMP cluster using C
programming language and the Message Passing Interface MPI.
Preliminary computational results on randomly generated dense
linear programs support our results.
Abstract: In this report we present a rule-based approach to
detect anomalous telephone calls. The method described here uses
subscriber usage CDR (call detail record) data sampled over two
observation periods: study period and test period. The study period
contains call records of customers- non-anomalous behaviour.
Customers are first grouped according to their similar usage
behaviour (like, average number of local calls per week, etc). For
customers in each group, we develop a probabilistic model to describe
their usage. Next, we use maximum likelihood estimation (MLE) to
estimate the parameters of the calling behaviour. Then we determine
thresholds by calculating acceptable change within a group. MLE is
used on the data in the test period to estimate the parameters of the
calling behaviour. These parameters are compared against thresholds.
Any deviation beyond the threshold is used to raise an alarm. This
method has the advantage of identifying local anomalies as compared
to techniques which identify global anomalies. The method is tested
for 90 days of study data and 10 days of test data of telecom
customers. For medium to large deviations in the data in test window,
the method is able to identify 90% of anomalous usage with less than
1% false alarm rate.
Abstract: The present study attempted to improve the Mercury
(Hg) sorption capacity of kanuma volcanic ash soil (KVAS) by
impregnating the cupper (Cu). Impregnation was executed by 1 and
5% Cu powder and sorption characterization of optimum Hg
removing Cu impregnated KVAS was performed under different
operational conditions, contact time, solution pH, sorbent dosage and
Hg concentration using the batch operation studies. The 1% Cu
impregnated KVAS pronounced optimum improvement (79%) in
removing Hg from water compare to control. The present
investigation determined the equilibrium state of maximum Hg
adsorption at 6 h contact period. The adsorption revealed a pH
dependent response and pH 3.5 showed maximum sorption capacity
of Hg. Freundlich isotherm model is well fitted with the experimental
data than that of Langmuir isotherm. It can be concluded that the Cu
impregnation improves the Hg sorption capacity of KVAS and 1%
Cu impregnated KVAS could be employed as cost-effective
adsorbent media for treating Hg contaminated water.
Abstract: In this work we introduce an efficient method to limit
the impact of the hiding process on the quality of the cover speech.
Vector quantization of the speech spectral information reduces drastically
the number of the secret speech parameters to be embedded
in the cover signal. Compared to scalar hiding, vector quantization
hiding technique provides a stego signal that is indistinguishable from
the cover speech. The objective and subjective performance measures
reveal that the current hiding technique attracts no suspicion about the
presence of the secret message in the stego speech, while being able
to recover an intelligible copy of the secret message at the receiver
side.
Abstract: In the meat processing industry the substitution of
meat with non-meat ingredients is considered an important strategy
for reducing overall production costs. The main purpose of the
current research was to evaluate differences in physical-chemical
composition of cooked sausage with different legumes additions.
Peas (Pisum sativum), beans (Phaseolus vulgaris) and lentil (Lens
culinaris) were used in preparation of sausages. The legumes at
proportion of 20% of the total weight of meat were added in
sausages. The whole ingredients were mixed, filled into casing,
compressed, cooked and cooled. After storage the samples were
sensory evaluated. The sensory evaluation was carried out using the
nine point hedonic scale and line scale. Sausages without legumes
flour was used as control sample. The main conclusion of the current
research the legumes flour can be successfully used for cooked
sausages production.
Abstract: Content-Based Image Retrieval has been a major area
of research in recent years. Efficient image retrieval with high
precision would require an approach which combines usage of both
the color and texture features of the image. In this paper we propose
a method for enhancing the capabilities of texture based feature
extraction and further demonstrate the use of these enhanced texture
features in Texture-Based Color Image Retrieval.
Abstract: The paper shows how the CASMAS modeling language,
and its associated pervasive computing architecture, can be
used to facilitate continuity of care by providing members of patientcentered
communities of care with a support to cooperation and
knowledge sharing through the usage of electronic documents and
digital devices. We consider a scenario of clearly fragmented care to
show how proper mechanisms can be defined to facilitate a better
integration of practices and information across heterogeneous care
networks. The scenario is declined in terms of architectural components
and cooperation-oriented mechanisms that make the support
reactive to the evolution of the context where these communities
operate.
Abstract: Phytases (myo-inositol hexakisphosphate
phosphohydrolases; EC 3.1.3.8) catalyze the hydrolysis of phytic acid
(myoinositol hexakisphosphate) to the mono-, di-, tri-, tetra-, and
pentaphosphates of myo-inositol and inorganic phosphate.
Therrmophilic bacteria isolated from water sampled from hot spring.
About 120 isolates of bacteria were successfully isolated form hot
spring water sample and tested for extracellular phytase producing.
After 5 passages of the screening on the PSM media, 4 isolates were
found stable in producing phytase enzyme. The 16s RDNA
sequencing for identification of bacteria using molecular technique
revealed that all isolates those positive in phytase producing are
belong to Geobacillus spp. And Anoxybacillus spp. Anoxybacillus
rupiensis UniSZA-7 were identified for their carbon source utilization
using Phenotype Microarray Plate of Biolog and found they utilize
several kind of carbon source provided.
Abstract: Learning is the acquisition of new mental schemata, knowledge, abilities and skills which can be used to solve problems potentially more successfully. The learning process is optimum when it is assisted and personalized. Learning is not a single activity, but should involve many possible activities to make learning become meaningful. Many e-learning applications provide facilities to support teaching and learning activities. One way to identify whether the e-learning system is being used by the learners is through the number of hits that can be obtained from the e-learning system's log data. However, we cannot rely solely to the number of hits in order to determine whether learning had occurred meaningfully. This is due to the fact that meaningful learning should engage five characteristics namely active, constructive, intentional, authentic and cooperative. This paper aims to analyze the e-learning activities that is meaningful to learning. By focusing on the meaningful learning characteristics, we match it to the corresponding Moodle e-learning activities. This analysis discovers the activities that have high impact to meaningful learning, as well as activities that are less meaningful. The high impact activities is given high weights since it become important to meaningful learning, while the low impact has less weight and said to be supportive e-learning activities. The result of this analysis helps us categorize which e-learning activities that are meaningful to learning and guide us to measure the effectiveness of e-learning usage.
Abstract: Augmented Reality (AR) shows great promises for
its usage as a tool for simulation and verification of design proposal
of new technological systems. Main advantage of augmented reality
application usage is possibility of creation and simulation of new
technological unit before its realization. This may contribute to
increasing of safety and ergonomics and decreasing of economical
aspects of new proposed unit. Virtual model of proposed workcell
could reveal hidden errors which elimination in later stage of new
workcell creation should cause great difficulties. Paper describes
process of such virtual model creation and possibilities of its
simulation and verification by augmented reality tools.
Abstract: This paper studied the synthesis of monoacylglycerol (monolaurin) by glycerolysis of coconut oil and crude glycerol, catalyzed by Carica papaya lipase. Coconut oil obtained from cold pressed extraction method and crude glycerol obtained from the biodiesel plant in Department of Chemistry, Uttaradit Rajabhat University, Thailand which used oils were used as raw materials for biodiesel production through transesterification process catalyzed by sodium hydroxide. The influences of the following variables were studied: (i) type of organic solvent, (ii) molar ratio of substrate, (iii) reaction temperature, (iv) reaction time, (v) lipase dosage, and (vi) initial water activity of enzyme. High yields in monoacylglycerol (58.35%) were obtained with molar ratio of glycerol to oil at 8:1 in ethanol, temperature was controlled at 45oC for 36 hours, the amount of enzyme used was 20 wt% of oil and initial water activity of enzyme at 0.53.
Abstract: The purpose of this study is to determine in what
ways elementary education prospective teachers are being informed
about innovations and to explain the role of social influence in the
usage process of a technological innovation in terms of genders. The
study group consisted of 300 prospective teachers, including 234
females and 66 males. Data have been collected by a questionnaire
developed by the researchers. The result of the study showed that,
while prospective teachers are being informed about innovations
most frequently by mass media, they rarely seek to take expert
advice. In addition, analysis of results showed that the social
influence on females were significantly higher than males in usage
process of a technological innovation.
Abstract: Recent years have witnessed the rapid development of
the Internet and telecommunication techniques. Information security
is becoming more and more important. Applications such as covert
communication, copyright protection, etc, stimulate the research of
information hiding techniques. Traditionally, encryption is used to
realize the communication security. However, important information
is not protected once decoded. Steganography is the art and science
of communicating in a way which hides the existence of the communication.
Important information is firstly hidden in a host data, such
as digital image, video or audio, etc, and then transmitted secretly
to the receiver.In this paper a data hiding model with high security
features combining both cryptography using finite state sequential
machine and image based steganography technique for communicating
information more securely between two locations is proposed.
The authors incorporated the idea of secret key for authentication
at both ends in order to achieve high level of security. Before the
embedding operation the secret information has been encrypted with
the help of finite-state sequential machine and segmented in different
parts. The cover image is also segmented in different objects through
normalized cut.Each part of the encoded secret information has been
embedded with the help of a novel image steganographic method
(PMM) on different cuts of the cover image to form different stego
objects. Finally stego image is formed by combining different stego
objects and transmit to the receiver side. At the receiving end different
opposite processes should run to get the back the original secret
message.
Abstract: There is wide range of scientific workflow systems
today, each one designed to resolve problems at a specific level. In
large collaborative projects, it is often necessary to recognize the
heterogeneous workflow systems already in use by various partners
and any potential collaboration between these systems requires
workflow interoperability. Publish/Subscribe Scientific Workflow
Interoperability Framework (PS-SWIF) approach was proposed to
achieve workflow interoperability among workflow systems. This
paper evaluates the PS-SWIF approach and its system to achieve
workflow interoperability using Web Services with asynchronous
notification messages represented by WS-Eventing standard. This
experiment covers different types of communication models provided
by Workflow Management Coalition (WfMC). These models are:
Chained processes, Nested synchronous sub-processes, Event
synchronous sub-processes, and Nested sub-processes
(Polling/Deferred Synchronous). Also, this experiment shows the
flexibility and simplicity of the PS-SWIF approach when applied to a
variety of workflow systems (Triana, Taverna, Kepler) in local and
remote environments.
Abstract: Fuller’s earth is a fine-grained, naturally occurring substance that has a substantial ability to adsorb impurities. In the present study Fuller’s earth has been characterized and used for the removal of Pb(II) from aqueous solution. The effect of various physicochemical parameters such as pH, adsorbent dosage and shaking time on adsorption were studied. The result of the equilibrium studies showed that the solution pH was the key factor affecting the adsorption. The optimum pH for adsorption was 5. Kinetics data for the adsorption of Pb(II) was best described by pseudo-second order model. The effective diffusion co-efficient for Pb(II) adsorption was of the order of 10-8 m2/s. The adsorption data for metal adsorption can be well described by Langmuir adsorption isotherm. The maximum uptake of metal was 103.3 mg/g of adsorbent. Mass transfer analysis was also carried out for the adsorption process. The values of mass transfer coefficients obtained from the study indicate that the velocity of the adsorbate transport from bulk to the solid phase was quite fast. The mean sorption energy calculated from Dubinin-Radushkevich isotherm indicated that the metal adsorption process was chemical in nature.
Abstract: Sensor Network are emerging as a new tool for
important application in diverse fields like military surveillance,
habitat monitoring, weather, home electrical appliances and others.
Technically, sensor network nodes are limited in respect to energy
supply, computational capacity and communication bandwidth. In
order to prolong the lifetime of the sensor nodes, designing efficient
routing protocol is very critical. In this paper, we illustrate the
existing routing protocol for wireless sensor network using data
centric approach and present performance analysis of these protocols.
The paper focuses in the performance analysis of specific protocol
namely Directed Diffusion and SPIN. This analysis reveals that the
energy usage is important features which need to be taken into
consideration while designing routing protocol for wireless sensor
network.
Abstract: In this paper the development of a software to
encrypt messages with asymmetric cryptography is presented. In
particular, is used the RSA (Rivest, Shamir and Adleman) algorithm
to encrypt alphanumeric information. The software allows to
generate different public keys from two prime numbers provided by
the user, the user must then select a public-key to generate the
corresponding private-key. To encrypt the information, the user must
provide the public-key of the recipient as well as the message to be
encrypted. The generated ciphertext can be sent through an insecure
channel, so that would be very difficult to be interpreted by an
intruder or attacker. At the end of the communication, the recipient
can decrypt the original message if provide his/her public-key and
his/her corresponding private-key.